News
Topics
Features
Webinars
White Papers
Podcasts
Events
Events & Conferences
Directory
Infosecurity Magazine Home
»
Heidi Parthena White
Heidi Parthena White
Director of Marketing, Security Engineered Machinery,
SEM
FISMA Requirements: Are You Compliant?
Blog
23 November 2021
Why Data Centers Need to Know About GLBA Compliance
Blog
28 October 2021
Think Your End-of-Life Data is Destroyed? Think Again!
Blog
16 September 2021
Data Security and Third-Party IT Asset Disposition: A Paradox
Blog
15 July 2020
The Shifting Sands of Data End-of-Life Destruction
Blog
19 June 2020
The Ticking Timebomb: Data Breaches from Hardware End-of-Life
Blog
10 June 2020
A Country in Crisis: Data Privacy in the US
Blog
5 June 2020
Who is Responsible for End-of-Life Data Destruction?
Blog
21 May 2020
Data Breaches from End-of-Life IT Devices: Not ‘If’ but ‘When’
Blog
12 May 2020
Why Data Centers Need Formal Data End-of-Life Processes
Blog
29 April 2020
Data Destruction and the Environment
Blog
10 April 2020
The Missing Link in Cloud Security
Opinion
2 April 2020
Best Practices in Designing a Data Decommissioning Policy
Blog
18 March 2020
What’s Hot on Infosecurity Magazine?
Read
Shared
Watched
Editor's Choice
France Fines National Employment Agency €5m Over 2024 Data Breach
News
29 January 2026
1
Google Disrupts Extensive Residential Proxy Networks
News
29 January 2026
2
Number of Cybersecurity Pros Surges 194% in Four Years
News
29 January 2026
3
Cybersecurity Teams Embrace AI, Just Not at the Scale Marketing Suggests
News
29 January 2026
4
Autonomous System Uncovers Long-Standing OpenSSL Flaws
News
28 January 2026
5
World Leaks Ransomware Group Claims 1.4TB Nike Data Breach
News
27 January 2026
6
Data Privacy Day: Why AI’s Rise Makes Protecting Personal Data More Critical Than Ever
News Feature
28 January 2026
1
Securing AI for Cyber Resilience: Building Trustworthy and Secure AI Systems
Blog
8 December 2025
2
AI Supercharges Attacks in Cybercrime's New 'Fifth Wave'
News
20 January 2026
3
Cyber Risk In 2026: How Geopolitics, Supply Chains and Shadow AI Will Test Resilience
Opinion
2 January 2026
4
Zero-Day Exploits Surge, Nearly 30% of Flaws Attacked Before Disclosure
News
22 January 2026
5
CISA Releases List of Post-Quantum Cryptography Product Categories
News
26 January 2026
6
Securing M365 Data and Identity Systems Against Modern Adversaries
Webinar
15:00 —
16:00, 22 January 2026
1
Revisiting CIA: Developing Your Security Strategy in the SaaS Shared Reality
Webinar
15:00 —
16:00, 11 December 2025
2
Five Non-Negotiable Strategies to Get Identity Security Right in 2026
Webinar
18:00 —
18:30, 22 January 2026
3
Risk-Based IT Compliance: The Case for Business-Driven Cyber Risk Quantification
Webinar
15:00 —
16:00, 23 October 2025
4
Cyber Defense in the Age of AI: Stay Ahead of Threats Without Compromising Safety
Webinar
15:00 —
16:00, 24 July 2025
5
How Mid-Market Businesses Can Leverage Microsoft Security for Proactive Defenses
Webinar
15:00 —
16:00, 6 November 2025
6
Regulating AI: Where Should the Line Be Drawn?
Opinion
12 November 2025
1
What Is Vibe Coding? Collins’ Word of the Year Spotlights AI’s Role and Risks in Software
News Feature
11 November 2025
2
Risk-Based IT Compliance: The Case for Business-Driven Cyber Risk Quantification
Webinar
15:00 —
16:00, 23 October 2025
3
Bridging the Divide: Actionable Strategies to Secure Your SaaS Environments
Blog
7 November 2025
4
NCSC Set to Retire Web Check and Mail Check Tools
News
10 November 2025
5
Beyond Bug Bounties: How Private Researchers Are Taking Down Ransomware Operations
Podcast
4 November 2025
6